Publication: Transformer-Based Model for Malicious URL Classification
dc.citedby | 1 | |
dc.contributor.author | Do N.Q. | en_US |
dc.contributor.author | Selamat A. | en_US |
dc.contributor.author | Lim K.C. | en_US |
dc.contributor.author | Krejcar O. | en_US |
dc.contributor.author | Ghani N.A.M. | en_US |
dc.contributor.authorid | 57283917100 | en_US |
dc.contributor.authorid | 24468984100 | en_US |
dc.contributor.authorid | 57889660500 | en_US |
dc.contributor.authorid | 14719632500 | en_US |
dc.contributor.authorid | 57215593148 | en_US |
dc.date.accessioned | 2024-10-14T03:19:24Z | |
dc.date.available | 2024-10-14T03:19:24Z | |
dc.date.issued | 2023 | |
dc.description.abstract | In recent years, cyber threats including malicious software, virus, spam, and phishing have grown aggressively via compromised Uniform Resource Locators (URLs). However, the current phishing URL detection solutions based on supervised learning use labeled data for training and classification, leading to the dependency on known attacking patterns. These approaches have limitations in fighting against evolving phishing tactics, resulting in a lack of robustness and sustainability. In this study, an unsupervised transformer model is proposed to address the drawbacks of the existing methods which use supervised learning to combat zero-day phishing attacks. Specifically, Bidirectional Encoder Representations from Transformers (BERT) is adopted in this paper to classify malicious URLs. The proposed model was trained on a public dataset and benchmarked with various baseline models using several performance metrics. Results obtained from the experiments showed that BERT-Medium achieved the highest detection accuracy of 98.55% among numerous transformer based models and outperformed other text embedding and deep learning techniques, indicating that the proposed solution is effective and robust in detecting phishing URLs. � 2023 IEEE. | en_US |
dc.description.nature | Final | en_US |
dc.identifier.doi | 10.1109/ICOCO59262.2023.10397705 | |
dc.identifier.epage | 327 | |
dc.identifier.scopus | 2-s2.0-85184851119 | |
dc.identifier.spage | 323 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85184851119&doi=10.1109%2fICOCO59262.2023.10397705&partnerID=40&md5=e95b171838ae85d7e157717e8b8fd6f6 | |
dc.identifier.uri | https://irepository.uniten.edu.my/handle/123456789/34380 | |
dc.pagecount | 4 | |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.source | Scopus | |
dc.sourcetitle | 2023 IEEE International Conference on Computing, ICOCO 2023 | |
dc.subject | malicious URL classification | |
dc.subject | natural language processing | |
dc.subject | phishing detection | |
dc.subject | transformer model | |
dc.subject | unsupervised learning | |
dc.subject | Classification (of information) | |
dc.subject | Computer crime | |
dc.subject | Learning algorithms | |
dc.subject | Learning systems | |
dc.subject | Natural language processing systems | |
dc.subject | Supervised learning | |
dc.subject | Viruses | |
dc.subject | Zero-day attack | |
dc.subject | 'current | |
dc.subject | Cyber threats | |
dc.subject | Labeled data | |
dc.subject | Language processing | |
dc.subject | Malicious uniform resource locator classification | |
dc.subject | Natural language processing | |
dc.subject | Natural languages | |
dc.subject | Phishing | |
dc.subject | Phishing detections | |
dc.subject | Transformer modeling | |
dc.subject | Deep learning | |
dc.title | Transformer-Based Model for Malicious URL Classification | en_US |
dc.type | Conference Paper | en_US |
dspace.entity.type | Publication |